establishingsecurity / trustzone-rootkit
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 2 years ago
Alternatives and similar repositories for trustzone-rootkit:
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- IDA (sort of) headless☆22Updated 11 months ago
- CTF writeups☆9Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- Sample Binary Ninja Plugin☆20Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- Tools released in CSS 2019☆38Updated 5 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Full chain Chrome 71.0.3578.98 exploit☆18Updated 3 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Ditto.☆17Updated 4 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated 7 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last week
- javascript extension of windbg for hacker.☆15Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 5 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- ☆10Updated 3 years ago
- ☆35Updated 4 years ago